1 /*
2 * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 /*
11 * All SHA low level APIs are deprecated for public use, but still ok for
12 * internal use.
13 */
14 #include "internal/deprecated.h"
15
16 #include <openssl/sha.h> /* diverse SHA macros */
17 #include "internal/sha3.h" /* KECCAK1600_WIDTH */
18 #include "crypto/evp.h"
19 /* Used by legacy methods */
20 #include "crypto/sha.h"
21 #include "legacy_meth.h"
22 #include "evp_local.h"
23
24 /*-
25 * LEGACY methods for SHA.
26 * These only remain to support engines that can get these methods.
27 * Hardware support for SHA3 has been removed from these legacy cases.
28 */
29 #define IMPLEMENT_LEGACY_EVP_MD_METH_SHA3(nm, fn, tag) \
30 static int nm##_init(EVP_MD_CTX *ctx) \
31 { \
32 return fn##_init(EVP_MD_CTX_get0_md_data(ctx), tag, ctx->digest->md_size * 8); \
33 } \
34 static int nm##_update(EVP_MD_CTX *ctx, const void *data, size_t count) \
35 { \
36 return fn##_update(EVP_MD_CTX_get0_md_data(ctx), data, count); \
37 } \
38 static int nm##_final(EVP_MD_CTX *ctx, unsigned char *md) \
39 { \
40 return fn##_final(md, EVP_MD_CTX_get0_md_data(ctx)); \
41 }
42 #define IMPLEMENT_LEGACY_EVP_MD_METH_SHAKE(nm, fn, tag) \
43 static int nm##_init(EVP_MD_CTX *ctx) \
44 { \
45 return fn##_init(EVP_MD_CTX_get0_md_data(ctx), tag, ctx->digest->md_size * 8); \
46 } \
47
48 #define sha512_224_Init sha512_224_init
49 #define sha512_256_Init sha512_256_init
50
51 #define sha512_224_Update SHA512_Update
52 #define sha512_224_Final SHA512_Final
53 #define sha512_256_Update SHA512_Update
54 #define sha512_256_Final SHA512_Final
55
IMPLEMENT_LEGACY_EVP_MD_METH(sha1,SHA1)56 IMPLEMENT_LEGACY_EVP_MD_METH(sha1, SHA1)
57 IMPLEMENT_LEGACY_EVP_MD_METH(sha224, SHA224)
58 IMPLEMENT_LEGACY_EVP_MD_METH(sha256, SHA256)
59 IMPLEMENT_LEGACY_EVP_MD_METH(sha384, SHA384)
60 IMPLEMENT_LEGACY_EVP_MD_METH(sha512, SHA512)
61 IMPLEMENT_LEGACY_EVP_MD_METH(sha512_224_int, sha512_224)
62 IMPLEMENT_LEGACY_EVP_MD_METH(sha512_256_int, sha512_256)
63 IMPLEMENT_LEGACY_EVP_MD_METH_SHA3(sha3_int, ossl_sha3, '\x06')
64 IMPLEMENT_LEGACY_EVP_MD_METH_SHAKE(shake, ossl_sha3, '\x1f')
65
66 static int sha1_int_ctrl(EVP_MD_CTX *ctx, int cmd, int p1, void *p2)
67 {
68 return ossl_sha1_ctrl(ctx != NULL ? EVP_MD_CTX_get0_md_data(ctx) : NULL,
69 cmd, p1, p2);
70 }
71
shake_ctrl(EVP_MD_CTX * evp_ctx,int cmd,int p1,void * p2)72 static int shake_ctrl(EVP_MD_CTX *evp_ctx, int cmd, int p1, void *p2)
73 {
74 KECCAK1600_CTX *ctx = evp_ctx->md_data;
75
76 switch (cmd) {
77 case EVP_MD_CTRL_XOF_LEN:
78 ctx->md_size = p1;
79 return 1;
80 default:
81 return 0;
82 }
83 }
84
85
86
87 static const EVP_MD sha1_md = {
88 NID_sha1,
89 NID_sha1WithRSAEncryption,
90 SHA_DIGEST_LENGTH,
91 EVP_MD_FLAG_DIGALGID_ABSENT,
92 EVP_ORIG_GLOBAL,
93 LEGACY_EVP_MD_METH_TABLE(sha1_init, sha1_update, sha1_final, sha1_int_ctrl,
94 SHA_CBLOCK),
95 };
96
EVP_sha1(void)97 const EVP_MD *EVP_sha1(void)
98 {
99 return &sha1_md;
100 }
101
102 static const EVP_MD sha224_md = {
103 NID_sha224,
104 NID_sha224WithRSAEncryption,
105 SHA224_DIGEST_LENGTH,
106 EVP_MD_FLAG_DIGALGID_ABSENT,
107 EVP_ORIG_GLOBAL,
108 LEGACY_EVP_MD_METH_TABLE(sha224_init, sha224_update, sha224_final, NULL,
109 SHA256_CBLOCK),
110 };
111
EVP_sha224(void)112 const EVP_MD *EVP_sha224(void)
113 {
114 return &sha224_md;
115 }
116
117 static const EVP_MD sha256_md = {
118 NID_sha256,
119 NID_sha256WithRSAEncryption,
120 SHA256_DIGEST_LENGTH,
121 EVP_MD_FLAG_DIGALGID_ABSENT,
122 EVP_ORIG_GLOBAL,
123 LEGACY_EVP_MD_METH_TABLE(sha256_init, sha256_update, sha256_final, NULL,
124 SHA256_CBLOCK),
125 };
126
EVP_sha256(void)127 const EVP_MD *EVP_sha256(void)
128 {
129 return &sha256_md;
130 }
131
132 static const EVP_MD sha512_224_md = {
133 NID_sha512_224,
134 NID_sha512_224WithRSAEncryption,
135 SHA224_DIGEST_LENGTH,
136 EVP_MD_FLAG_DIGALGID_ABSENT,
137 EVP_ORIG_GLOBAL,
138 LEGACY_EVP_MD_METH_TABLE(sha512_224_int_init, sha512_224_int_update,
139 sha512_224_int_final, NULL, SHA512_CBLOCK),
140 };
141
EVP_sha512_224(void)142 const EVP_MD *EVP_sha512_224(void)
143 {
144 return &sha512_224_md;
145 }
146
147 static const EVP_MD sha512_256_md = {
148 NID_sha512_256,
149 NID_sha512_256WithRSAEncryption,
150 SHA256_DIGEST_LENGTH,
151 EVP_MD_FLAG_DIGALGID_ABSENT,
152 EVP_ORIG_GLOBAL,
153 LEGACY_EVP_MD_METH_TABLE(sha512_256_int_init, sha512_256_int_update,
154 sha512_256_int_final, NULL, SHA512_CBLOCK),
155 };
156
EVP_sha512_256(void)157 const EVP_MD *EVP_sha512_256(void)
158 {
159 return &sha512_256_md;
160 }
161
162 static const EVP_MD sha384_md = {
163 NID_sha384,
164 NID_sha384WithRSAEncryption,
165 SHA384_DIGEST_LENGTH,
166 EVP_MD_FLAG_DIGALGID_ABSENT,
167 EVP_ORIG_GLOBAL,
168 LEGACY_EVP_MD_METH_TABLE(sha384_init, sha384_update, sha384_final, NULL,
169 SHA512_CBLOCK),
170 };
171
EVP_sha384(void)172 const EVP_MD *EVP_sha384(void)
173 {
174 return &sha384_md;
175 }
176
177 static const EVP_MD sha512_md = {
178 NID_sha512,
179 NID_sha512WithRSAEncryption,
180 SHA512_DIGEST_LENGTH,
181 EVP_MD_FLAG_DIGALGID_ABSENT,
182 EVP_ORIG_GLOBAL,
183 LEGACY_EVP_MD_METH_TABLE(sha512_init, sha512_update, sha512_final, NULL,
184 SHA512_CBLOCK),
185 };
186
EVP_sha512(void)187 const EVP_MD *EVP_sha512(void)
188 {
189 return &sha512_md;
190 }
191
192 #define EVP_MD_SHA3(bitlen) \
193 const EVP_MD *EVP_sha3_##bitlen(void) \
194 { \
195 static const EVP_MD sha3_##bitlen##_md = { \
196 NID_sha3_##bitlen, \
197 NID_RSA_SHA3_##bitlen, \
198 bitlen / 8, \
199 EVP_MD_FLAG_DIGALGID_ABSENT, \
200 EVP_ORIG_GLOBAL, \
201 LEGACY_EVP_MD_METH_TABLE(sha3_int_init, sha3_int_update, \
202 sha3_int_final, NULL, \
203 (KECCAK1600_WIDTH - bitlen * 2) / 8), \
204 }; \
205 return &sha3_##bitlen##_md; \
206 }
207 #define EVP_MD_SHAKE(bitlen) \
208 const EVP_MD *EVP_shake##bitlen(void) \
209 { \
210 static const EVP_MD shake##bitlen##_md = { \
211 NID_shake##bitlen, \
212 0, \
213 bitlen / 8, \
214 EVP_MD_FLAG_XOF, \
215 EVP_ORIG_GLOBAL, \
216 LEGACY_EVP_MD_METH_TABLE(shake_init, sha3_int_update, sha3_int_final, \
217 shake_ctrl, (KECCAK1600_WIDTH - bitlen * 2) / 8), \
218 }; \
219 return &shake##bitlen##_md; \
220 }
221
222 EVP_MD_SHA3(224)
223 EVP_MD_SHA3(256)
224 EVP_MD_SHA3(384)
225 EVP_MD_SHA3(512)
226
227 EVP_MD_SHAKE(128)
228 EVP_MD_SHAKE(256)
229